Founded by cyber security veterans, it is our top priority to go to infinity and beyond to protect the security and privacy of your data.
Multi-Layer Architecture
Full Control & Visibility
SOC2 Type II & GDPR Ready
Full Privacy
End to End Encryption
Rest assured -
your data is safe!
SOC2 Type II & GDPR Ready
Multi-Layer Architecture
Full Privacy
Full Control & Visibility
End to End Encryption
We want to instill confidence in you that we take this matter seriously and strive to be transparent about the ways we do so.
Any user data both in transit and at rest is encrypted with the latest and most advanced security protocols.
Data at rest is protected using AES256 and TLS 1.3 is used for protecting data in transit.
Any data that we obtain is stored on our data centers, only. Our data centers are hosted on two cloud services providers, which are both best in their class, Amazon AWS & Microsoft Azure (Both are SOC II Type 2 complaint).
All servers are protected inside a private network, beyond firewalls and VPN.
Access is limited to key personal only who have physical access to the office.
You can view our data centre compliance pages via these links:
Microsoft Azure Compliance Offerings
AWS SOC 3 Report
The culture and internal development, operations, and DevOps processes at Unleash have been constructed to provide maximum data security, governed by external SOC II audit firm E&Y.
As part of the process for receiving the SOC 2 Certificate, we regularly run penetration tests through external independent security firms, such as E&Y, to protect against any types of vulnerability.
*Our report is available upon request
Adhering to best security practices, the strictest development processes and coding standards are employed at Unleash.
All R&D processes that are implemented and supported are done so with security as a top priority across all system layers.
We request the minimal amount of permissions required to facilitate functionality when you connect an app to Unleash.
You and you alone decide which services to link to Unleash and what level of access to grant us.
*We do not ask or even request any passwords at all. All connections are done through OAuth1 and OAuth2 which are secured 3rd party authentication protocols.
The contents of any users data cannot mistakenly or intentionally be viewed by Unleash employees. By company policy and technologically, we do not have the tools to query a users data or log in as a user.
*Your data belongs to you and only to you. We do not share or sell your personal info to any 3rd party or use it for any other purposes.
End to End Encryption
Highest Class Data Center
Development Process
Penetration Testing
Security-Oriented Environment
Minimal Permissions
Control & Visibility
Full Privacy
Download the Linux version for FREE today.